31 May 2013 Security analysis for fingerprint fuzzy vaults
Author Affiliations +
Abstract
In this work we place some of the traditional biometrics work on fingerprint verification via the fuzzy vault scheme within a cryptographic framework. We show that the breaking of a fuzzy vault leads to decoding of Reed-Solomon codes from random errors, which has been proposed as a hard problem in the cryptography community. We provide a security parameter for the fuzzy vault in terms of the decoding problem, which gives context for the breaking of the fuzzy vault, whereas most of the existing literature measures the strength of the fuzzy vault in terms of its resistance to pre-defined attacks or by the entropy of the vault. We keep track of our security parameter, and provide it alongside ROC statistics. We also aim to be more aware of the nature of the fingerprints when placing them in the fuzzy vault, noting that the distribution of minutiae is far from uniformly random. The results we show provide additional support that the fuzzy vault can be a viable scheme for secure fingerprint verification.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jesse Hartloff, Jesse Hartloff, Maxwell Bileschi, Maxwell Bileschi, Sergey Tulyakov, Sergey Tulyakov, Jimmy Dobler, Jimmy Dobler, Atri Rudra, Atri Rudra, Venu Govindaraju, Venu Govindaraju, } "Security analysis for fingerprint fuzzy vaults", Proc. SPIE 8712, Biometric and Surveillance Technology for Human and Activity Identification X, 871204 (31 May 2013); doi: 10.1117/12.2016635; https://doi.org/10.1117/12.2016635
PROCEEDINGS
12 PAGES


SHARE
RELATED CONTENT

Cryptographic key generation using handwritten signature
Proceedings of SPIE (April 16 2006)
On security threats for robust perceptual hashing
Proceedings of SPIE (February 04 2009)
Cryptographically secure biometrics
Proceedings of SPIE (April 14 2010)
How to protect biometric templates
Proceedings of SPIE (February 26 2007)
A hybrid approach for face template protection
Proceedings of SPIE (March 16 2008)

Back to Top